Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:20
Behavioral task
behavioral1
Sample
ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe
-
Size
768KB
-
MD5
ea929ecd8d8efacf94e0f2c8ed4b3f1e
-
SHA1
05353df8871af9b77ca2c52a589f72496be43a7b
-
SHA256
646a9d16d574eba1abdd98582c718ba3ec12c8d0d1db7cea68e7665b3091fc8a
-
SHA512
6582087b654e893cf26c3825e6e0648328bc38720b2d3c97179e07d2be85efd4daeaf041b783afb0f3c2a007c85dc80ef1c6860111bd259d3f24b20927a6e099
-
SSDEEP
24576:u9PKupMkO+Xtqf9W5PTFnpfywjCGA4i/28cH:0SIMatqVObFnpqQ0TO8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "userinit.exe,C:\\Windows\\apocalyps32.exe" apocalyps32.exe -
ModiLoader Second Stage 27 IoCs
resource yara_rule behavioral1/memory/948-2-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/948-4-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/948-3-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/948-6-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/948-14-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-25-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-26-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-24-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-16-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-28-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-29-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-30-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-31-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-32-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-33-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-34-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-35-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-36-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-37-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-38-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-39-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-40-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-41-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-42-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-43-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-44-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 behavioral1/memory/2788-45-0x0000000030000000-0x00000000301A9000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2788 apocalyps32.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Wine ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Wine apocalyps32.exe -
resource yara_rule behavioral1/memory/948-0-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/948-2-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/948-4-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/948-3-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/948-6-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/948-8-0x00000000041A0000-0x0000000004349000-memory.dmp themida behavioral1/files/0x000f000000012255-11.dat themida behavioral1/memory/948-14-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-25-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-26-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-24-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-16-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-28-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-29-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-30-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-31-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-32-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-33-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-34-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-35-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-36-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-37-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-38-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-39-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-40-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-41-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-42-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-43-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-44-0x0000000030000000-0x00000000301A9000-memory.dmp themida behavioral1/memory/2788-45-0x0000000030000000-0x00000000301A9000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\apocalyps32 = "C:\\Windows\\apocalyps32.exe" apocalyps32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 948 ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe 2788 apocalyps32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe File opened for modification C:\Windows\apocalyps32.exe ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 948 ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe 2788 apocalyps32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 apocalyps32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2788 apocalyps32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 948 wrote to memory of 2788 948 ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe 29 PID 948 wrote to memory of 2788 948 ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe 29 PID 948 wrote to memory of 2788 948 ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe 29 PID 948 wrote to memory of 2788 948 ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe 29 PID 2788 wrote to memory of 1252 2788 apocalyps32.exe 20 PID 2788 wrote to memory of 1252 2788 apocalyps32.exe 20 PID 2788 wrote to memory of 1252 2788 apocalyps32.exe 20 PID 2788 wrote to memory of 1252 2788 apocalyps32.exe 20 PID 2788 wrote to memory of 1252 2788 apocalyps32.exe 20 PID 2788 wrote to memory of 1252 2788 apocalyps32.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea929ecd8d8efacf94e0f2c8ed4b3f1e_JaffaCakes118.exe"2⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\apocalyps32.exe-bs3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768KB
MD5ea929ecd8d8efacf94e0f2c8ed4b3f1e
SHA105353df8871af9b77ca2c52a589f72496be43a7b
SHA256646a9d16d574eba1abdd98582c718ba3ec12c8d0d1db7cea68e7665b3091fc8a
SHA5126582087b654e893cf26c3825e6e0648328bc38720b2d3c97179e07d2be85efd4daeaf041b783afb0f3c2a007c85dc80ef1c6860111bd259d3f24b20927a6e099